Static task
static1
Behavioral task
behavioral1
Sample
aa935a6c0a420898780c7392b238901a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aa935a6c0a420898780c7392b238901a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aa935a6c0a420898780c7392b238901a_JaffaCakes118
-
Size
212KB
-
MD5
aa935a6c0a420898780c7392b238901a
-
SHA1
95daee13e2204711d87e338e3cfa763cd1de2c0b
-
SHA256
239d62db162871203606c6adbcec0cfcf5158e8cf3c0bd1e7a97d1c3bca52afe
-
SHA512
69f8cef8533a0d52c70bdbaa2a339a0b9d712bf0bfaacdde185d9d498d18c07785b0780cfe4c2dce705276e722058034ad3140aad55444411d6ce546b791a660
-
SSDEEP
3072:4bjM5wguBFNpv+pcRBJivTWJHvt5MgboGyQJ05qJ5gT:g+RKFzTrJHvt5uYJzJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa935a6c0a420898780c7392b238901a_JaffaCakes118
Files
-
aa935a6c0a420898780c7392b238901a_JaffaCakes118.exe windows:5 windows x86 arch:x86
712147bb9ba5178f46b65f10e8aa3f7c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetModuleHandleA
WriteFile
CreateFileA
GetTickCount
GetVersionExA
TerminateProcess
CompareStringW
CompareStringA
FlushFileBuffers
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenEventA
SetEvent
DeleteFileA
CopyFileA
GetLastError
OutputDebugStringA
OpenProcess
LoadLibraryA
GetProcAddress
GetCurrentProcess
WriteProcessMemory
GetSystemDirectoryA
GetWindowsDirectoryA
MoveFileExA
CreateThread
CloseHandle
Sleep
CreateProcessA
lstrlenA
GetModuleFileNameA
SetStdHandle
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
HeapSize
HeapReAlloc
VirtualAlloc
GetConsoleMode
GetConsoleCP
RtlUnwind
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualQuery
HeapFree
HeapAlloc
RaiseException
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
SetEnvironmentVariableA
user32
PostMessageA
CloseWindowStation
CharUpperA
GetUserObjectInformationA
GetProcessWindowStation
FindWindowA
advapi32
AdjustTokenPrivileges
ControlService
StartServiceA
DeleteService
CreateServiceA
QueryServiceStatus
CreateProcessAsUserA
OpenProcessToken
RegQueryValueExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerExA
GetUserNameA
QueryServiceConfigA
ChangeServiceConfigA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatusEx
SetServiceStatus
RegOpenKeyExA
RegSetValueExA
RegCloseKey
LookupPrivilegeValueA
shlwapi
PathFileExistsA
wininet
InternetConnectA
HttpSendRequestA
InternetSetOptionA
HttpOpenRequestA
HttpQueryInfoA
InternetCloseHandle
InternetReadFile
InternetOpenA
Sections
.text Size: 153KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ